POST 2018 Accepted Papers

  • Ian Sweet, Jose Calderon, Chad Scherrer, Michael Hicks and Stephen Magill. What's the Over/Under? Probabilistic Bounds on Information Leakage
  • Giada Sciarretta, Roberto CarboneSilvio Ranise and Luca Viganò. Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
  • Panagiotis Vasilikos, Flemming Nielson and Hanne Riis Nielson. Secure Information Release in Timed Automata
  • Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov and Lars Birkedal. Compositional Non-Interference for Concurrent Programs via Separation and Framing
  • Hamed Nemati, Roberto Guanciale, Christoph Baumann and Mads Dam. Formal Verification of Integrity Preserving Countermeasures against Cache Storage
  • Chiara BodeiPierpaolo DeganoRiccardo Focardi, Letterio Galletta and Mauro Tempesta. Transcompiling Firewalls
  • Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande and Roberto Zunino. SoK: unraveling Bitcoin smart contracts
  • Ilya Grishchenko, Matteo Maffei and Clara Schneidewind. A Semantic Framework for the Security Analysis of Ethereum smart contracts
  • Barbara Kordy and Wojciech Widel. On quantitative analysis of attack-defense trees with repeated labels
  • Véronique Cortier, Niklas Grimm, Joseph Lallemand and Matteo Maffei. Equivalence properties by typing in cryptographic branching protocols
  • Arthur Azevedo de Amorim, Catalin Hritcu and Benjamin Pierce. The Meaning of Memory Safety
  • Reinhard MunzFabienne EignerMatteo MaffeiPaul Francis and Deepak Garg. UniTraX: Protecting Data Privacy with Discoverable Biases
  • Anastasia Mavridou and Aron Laszka. Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
  • Mario S. AlvimKonstantinos Chatzikokolakis, Yusuke Kawamoto and Catuscia Palamidessi. Leakage and protocol composition in a game-theoretic perspective

Who's online

We have 764 guests and no members online

Site Hosted by